<center><ins data-revive-zoneid="29" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script></center>

The cracks in the password wall

For years, passwords stood as the first - and often only - line of defence between users and cybercriminals. Yet as attacks became more sophisticated, this once-reliable shield turned into a vulnerability, writes Kumar Vaibhav, lead senior solution architect:...

Continuous threat exposure management the new cybersecurity imperative

The old playbook of periodic vulnerability scans and annual security audits no longer suffices when attackers operate in real time, using automation and artificial intelligence (AI) to exploit the tiniest cracks in digital defences. By Saurabh Prasad, senior solution...

Top 10 cybersecurity trends and terrors of 2026

There is one word that describes cybersecurity right now, writes Jeanette Simpson, head of product management at Armata Cyber Security, and that’s ‘acceleration’. Attacks are scaling faster. Ransomware activity has increased 25% year-on-year and the number of...

Deepfake fraud escalates as detection technology enters SA

Certified AI Access, a South African AI trust and risk infrastructure company, and Reality Defender, a deepfake detection platform, today announced a partnership to deploy enterprise-grade deepfake detection technology across South Africa’s financial sector. The...

When cyber laws backfire …

Regulation was designed to protect customers, curb risk, and hold businesses accountable. But today, it’s often doing the opposite - creating impossible trade-offs, punishing transparency, and turning defenders into accidental offenders. By John Mc Loughlin, CEO of ...

read more

CIMA launches 2025 Cybersecurity Tool 

The Chartered Institute of Management Accountants (CIMA) has launched the latest version of its CGMA Cybersecurity Tool, designed to help finance professionals tackle the growing threat of cyberattacks through robust risk management, response, and remediation...

read more
When likes become a liability …

When likes become a liability …

The use of social media at work – especially on devices connected to internal networks – is putting South African businesses at risk of data breaches and cyberattacks. With no specific laws governing social media use in the workplace, many businesses operate without...

read more

Five ways to outsmart cybercriminals

It often starts with something small: a WhatsApp from a number you don’t recognise, an email that looks like it’s from your bank, or a limited-time offer that seems too good to ignore. Within minutes, a single click or slip of the tongue can cost you thousands....

read more
<center><!-- [et_pb_line_break_holder] --><ins data-revive-zoneid="11" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script><!-- [et_pb_line_break_holder] --></center>